E-mail Defense System (EDS). The problem today 15,000,000 virus-infected e-mail messages and millions of junk e-mail messages go across the NU Network.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

How to Use Stowe School District
1 Effective, secure and reliable hosted security and continuity solution.
Uniworld Wire-less Wireless at Your Fingertips.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Clean Out the Junk! Outsmarting Unsolicited NUIT Tech Talk Presentation February 18, 2005 Sherry Minton Dan Frommer.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
The Times Are Changing What’s New & Changing with Technology at Northwestern NUIT Tech Talk – May 13, 2005.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Hearth Bulk System Divisional Secretaries’ Briefing 2012.
Migration Not such a big deal. What am I getting Increased mailbox size (from 2 GB to 50 GB for university Exchange users) Unified and calendaring.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
This is the first page of the log in, this is were you enter your unique details.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Office 365 Administration Ron Schindler See full Office 365 Admin course on Ron Schindler See.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Microsoft Exchange in the College of Engineering Jerry Ciolkosz Senior Systems Analyst Electronic and Computing Services October 16, 2003.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
September 29, 2009Computer Security Awareness Day1 Fermilab.
FINAL PROJECT Shelby LeVasseur CSC Fall 2012 November 27 th, December 13 th, 2012.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
UCLA Enterprise Messaging Enterprise Messaging (EM) Migration C OLLEGE OF L ETTERS & S CIENCE D IVISION OF UNDERGRADUATE E DUCATION 03/05/2010 EXCH 2007.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Client Config Tool (CCT) Training December 16 & 17, 2003 Powered by.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Created by Ed, VE7ED.  For a Winlink user to receive a message, the sender's address must be listed in the recipient's whitelist (the accept list)
Implementing Microsoft Exchange Online with Microsoft Office 365
UNIW RLD WIRELESS. What If You Could…  Send and Receive s from the beach?  Schedule a meeting on your commute to work?  Forward an urgent message.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Managing Windows Security
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
Real World Advanced Threat Protection
ONE® Mail Training Presentation
COMPLETE BUSINESS TEXTING SOLUTION
Division of Engineering Computing Services
Presentation transcript:

Defense System (EDS)

The problem today 15,000,000 virus-infected messages and millions of junk messages go across the NU Network each year; both are on the rise. University constituents and NUIT are very concerned about the increase of junk mail and viruses, and the effect on productivity. Webmail and handheld devices cannot benefit from desktop client junk mail filtering tools.

What has NU been doing about this? Information about client side filtering has been made available on the NUIT Web site. – Conversations with NU Legal have been in process to ensure that server level filtering does not violate the pursuit of academic freedom. NUIT has been monitoring the marketplace. It wasn’t until recently that a clear leader emerged at a price point that is acceptable to the University. NUIT has conferred with peer institutions to learn from their experience. Dec Sept. 2005: Completed trial, purchase and deployment of Sophos PureMessage (a.k.a. NU’s Defense System) on our central servers.

How will this help with viruses? Stops and deletes most infected messages and attachments, preventing them from reaching the desktop. Automatically downloads the latest enterprise level virus definitions (versus previous home-grown system). As NUIT has previously announced, EDS has been filtering viruses since May 2005 and uses the most recent virus definitions available.

What are the benefits? Productivity increases (less time spent going through unsolicited ). WebMail becomes a more useful tool. Less chance of a user hitting the 50MB quota on the server. Increased network security.

How does it work? Quarantine EDS

What’s a “quarantine”? Separate location on the network holds blocked unsolicited messages. –To minimize ISP blocking, not available for alumni. Blocked messages held in quarantine 7 days before deletion. –Can extend for up to 120 days. Managed through daily quarantine digest or Web site.

How it works October 3, 2005: EDS scanning will begin.

How it works

What can I do to manage my messages? From the daily quarantine digest: Review junk messages. Retrieve messages from quarantine. From the Web page: Opt out and in. Retrieve messages from quarantine (for those who use WebMail, are traveling, or want to change EDS options). Turn daily digest delivery off and on. Add or delete blocked or approved senders. Extend quarantine in special cases or when away from for longer periods of time.

Things to be aware of Web site is a slower option for managing quarantined messages; use daily digest instead. Listserv messages are not scanned. – System not 100% foolproof; there may be false positives and false negatives. Some client-side filtering still required. – You can always opt out!!

Digest Demo Defense System Demo EDS Web site * Please review this site before October 3! *

Questions? Contact: NUIT Support Center HELP (4357) or